Find an IT Download

Guide to Spyware

Spyware is no longer just an annoying advertising gimmick. Professional criminals use it for identify theft and large-scale scams. This guide will give you and overview of the technical solutions for fighting spyware.

171 KB | 3 files | null DOC,null PDF

Spyware is becoming more widespread as online attackers and traditional criminals use it as a tool for crimes against individuals, businesses, and governments. Statutes banning spyware exist in a number of states and Congress is considering national legislation.

Spyware can lead to financial loss, as in identity theft and credit card fraud, and it can also reduce consumers' confidence in online safety and their willingness to participate in modern electronic commerce.

One approach to combating spyware is to make it less profitable for the criminals using it. Technical solutions that combat spyware focus on finding, blocking, or removing spyware.

This research guide gives an overview of spyware and outlines some practices to defend against it.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Guide to Spyware.pdf


Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your coloc...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More